R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

Remote offsite and Onsite FFIEC IT Audits

April 23, 2023

Newsletter Content FFIEC IT Security FFIEC & ADA Web Site Audits
Web Site Compliance NIST Handbook Penetration Testing
Does Your Financial Institution need an affordable cybersecurity Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our cybersecurity audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) as well as the penetration test complies with the FFIEC Cybersecurity Assessment Tool regarding resilience testing The cybersecurity penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world cybersecurity weaknesses.  For more information, give R. Kinney Williams a call today at Office/Cell 806-535-8300 or visit http://www.internetbankingaudits.com/.
Remote bank regulatory FFIEC IT audits - I am performing virtual/remote bank regality FFIEC IT audits for banks and credit unions.  I am a former bank examiner with years of IT auditing experience.  Please contact R. Kinney Williams at examiner@yennik.com from your bank's email and I will send you information and fees.  All correspondence is confidential.


MISCELLANEOUS CYBERSECURITY NEWS:

Industry launches hacking policy council, legal defense fund to support security research and disclosures - Google and other companies will develop and stand up a pair of new initiatives that will provide policy guidance to governments and legal protection to security researchers engaged in “good faith” vulnerability research and disclosure, while the tech giant also said it would formalize an internal policy to be publicly transparent when bugs in Google products are exploited in the wild. https://www.scmagazine.com/news/leadership/hacking-policy-council-launched-to-support-security-research-and-disclosures

Why does it take so long for security teams to remediate vulnerabilities? - Recent analysis of about 1,000 companies found just 13% of vulnerabilities observed were remediated and took an average of 271 days for security teams to address them. https://www.scmagazine.com/perspective/vulnerability-management/why-does-it-take-so-long-for-security-teams-to-remediate-vulnerabilities

CISA, Others Unveil Guide for Secure Software Manufacturing - The United States and half a dozen other countries sought to reverse decades of tech industry attitudes in a Thursday document pleading with manufacturers to make cybersecurity a core business goal. https://www.govinfosecurity.com/cisa-others-unveil-guide-for-secure-software-manufacturing-a-21673

How insecure is America's FirstNet emergency response system? Seriously, anyone know? - AT&T is "concealing vital cybersecurity reporting" about its FirstNet phone network for first responders and the US military, according to US Senator Ron Wyden (D-OR), who said the network had been dubbed unsafe by CISA. https://www.theregister.com/2023/04/12/firstnet_cybersecurity_audit_wyden/

SEC targets cloud, key securities firms in latest regulatory broadside - The Securities and Exchange Commission is seeking to broaden the range of companies in the securities market that would be subject to stricter regulations for compliance and integrity of their information systems, while proposing a host of new requirements for those businesses around cybersecurity and their use of third-party cloud providers. https://www.scmagazine.com/analysis/business-continuity/sec-targets-cloud-key-securities-firms-regulatory-broadside

CYBERSECURITY ATTACKS, INTRUSIONS, DATA THEFT & LOSS:

Ransomware strikes POS platform used by NCR’s customers in hospitality industry - NCR disclosed on Saturday that it was hit with a ransomware attack on its Aloha point-of-sale (POS) platform targeted towards the company’s hospitality and restaurant customers. https://www.scmagazine.com/news/ransomware/ransomware-strikes-pos-platform-ncr

HHS Cybersecurity Task Force Releases New Resources to Address Rise in Healthcare Cyberattacks - Led by the HHS 405(d) Program and the HSCC CWG, the new resources include an update to the HICP and an educational platform offering healthcare cybersecurity trainings. https://healthitsecurity.com/news/hhs-cybersecurity-task-force-releases-new-resources-to-address-rise-in-healthcare-cyberattacks

Payments Giant NCR Hit by Ransomware - NCR first reported investigating an “issue” related to its Aloha restaurant point-of-sale (PoS) product on April 12. On April 15, the company said a limited number of ancillary Aloha applications for a subset of its hospitality customers had been impacted by an outage at a single data center. https://www.securityweek.com/payments-giant-ncr-hit-by-ransomware/

German arms manufacturer Rheinmetall confirms cyberattack - German automotive and arms manufacturer Rheinmetall suffered a cyberattack on Friday, the company said. https://therecord.media/rheinmetall-cyberattack-germany-arms-manufacturer

DC Health Link says human error led to Congress members’ stolen data - Newly released details into the hack of DC Health Link Exchange in early March show the hack was caused by an employee error: a misconfigured server allowed access without authentication and led to the theft of two reports. https://www.scmagazine.com/news/incident-response/dc-health-link-says-human-error-led-to-congress-members-stolen-data

Return to the top of the newsletter

WEB SITE COMPLIANCE -
Truth in Lending Act (Regulation Z)
  
  The commentary to regulation Z was amended recently to clarify that periodic statements for open-end credit accounts may be provided electronically, for example, via remote access devices. The regulations state that financial institutions may permit customers to call for their periodic statements, but may not require them to do so. If the customer wishes to pick up the statement and the plan has a grace period for payment without imposition of finance charges, the statement, including a statement provided by electronic means, must be made available in accordance with the "14-day rule," requiring mailing or delivery of the statement not later than 14 days before the end of the grace period.
  
  Provisions pertaining to advertising of credit products should be carefully applied to an on-line system to ensure compliance with the regulation. Financial institutions advertising open-end or closed-end credit products on-line have options. Financial institutions should ensure that on-line advertising complies with the regulations. For on-line advertisements that may be deemed to contain more than a single page, financial institutions should comply with the regulations, which describe the requirements for multiple-page advertisements.


Return to the top of the newsletter

FFIEC IT SECURITY - We begin a new series  from the FDIC "Security Risks Associated with the Internet."  While this Financial Institution Letter was published in December 1997, the issues still are relevant.
   
   This FDIC paper alerts financial institutions to the fundamental technological risks presented by use of the Internet. Regardless of whether systems are maintained in-house or services are outsourced, bank management is responsible for protecting systems and data from compromise.

   
   Security Risks 

   
   The Internet is inherently insecure. By design, it is an open network which facilitates the flow of information between computers. Technologies are being developed so the Internet may be used for secure electronic commerce transactions, but failure to review and address the inherent risk factors increases the likelihood of system or data compromise. Five areas of concern relating to both transactional and system security issues, as discussed below, are: Data Privacy and Confidentiality, Data Integrity, Authentication, Non-repudiation, and Access Control/System Design. 

   
   Data Privacy and Confidentiality 

   
   Unless otherwise protected, all data transfers, including electronic mail, travel openly over the Internet and can be monitored or read by others. Given the volume of transmissions and the numerous paths available for data travel, it is unlikely that a particular transmission would be monitored at random. However, programs, such as "sniffer" programs, can be set up at opportune locations on a network, like Web servers (i.e., computers that provide services to other computers on the Internet), to simply look for and collect certain types of data. Data collected from such programs can include account numbers (e.g., credit cards, deposits, or loans) or passwords. 
   
   Due to the design of the Internet, data privacy and confidentiality issues extend beyond data transfer and include any connected data storage systems, including network drives. Any data stored on a Web server may be susceptible to compromise if proper security precautions are not taken.


Return to the top of the newsletter

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY - We continue the series on the National Institute of Standards and Technology (NIST) Handbook.
  
  Chapter 4 - COMMON THREATS: A BRIEF OVERVIEW
  
  Computer systems are vulnerable to many threats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centers. Losses can stem, for example, from the actions of supposedly trusted employees defrauding a system, from outside hackers, or from careless data entry clerks. Precision in estimating computer security-related losses is not possible because many losses are never discovered, and others are "swept under the carpet" to avoid unfavorable publicity. The effects of various threats varies considerably: some affect the confidentiality or integrity of data while others affect the availability of a system.
  
  This chapter presents a broad view of the risky environment in which systems operate today. The threats and associated losses presented in this chapter were selected based on their prevalence and significance in the current computing environment and their expected growth. This list is not exhaustive, and some threats may combine elements from more than one area. This overview of many of today's common threats may prove useful to organizations studying their own threat environments; however, the perspective of this chapter is very broad. Thus, threats against particular systems could be quite different from those discussed here.
  
  To control the risks of operating an information system, managers and users need to know the vulnerabilities of the system and the threats that may exploit them. Knowledge of the threat environment allows the system manager to implement the most cost-effective security measures. In some cases, managers may find it more cost-effective to simply tolerate the expected losses. Such decisions should be based on the results of a risk analysis.


PLEASE NOTE:
 
Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.